Abstract
In today’s world where the crime rates are increasing exponentially, human safety and security is of utmost importance. Confidentiality is a demand of each and every person in terms of physicality and digitally. Every person can and should have the knowledge to defend himself against unwanted intrusions and this Security System is a simple step in that direction. Access to Technology such as laptops, tablets and smartphone cannot be easier in today’s generation. This System can be used by anyone and everyone who has basic coding knowledge without the need for any additional and expensive hardware and that to minimal cost and that too effectively. Every breach of security carries with itself a new and innovative method to counter the existing security measures and hence we have tried to provide the users with the maximum amount of performance and capability that any Security system would need with minimal cost and resources in an easy-to-understand manner. Using this System the user will have the capability to detect an Intrusion via its three main Security Algorithms implemented in Java. Additional features such as automated mailing and Live streaming will help in enhancing the System. Also features such as user verification via OTP (One time Password) are also a part of the System.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Common Criteria version 2.1 (Part 1: Intro & General Model, Part 2: Functional Requirements, Part 3: Assurance Requirements). ISO/IEC 15408. http://www.commoncriteria.org. Accessed 09 Mar 2001
Glossary of Computer Security Terms (ìTeal Green Bookî). National Computer Security Center, NCSC-TG-004, 52 p. (1988). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001
Fournier, R.: A Methodology for Client/Server and Web Application Development. Prentice Hall, Inc., 648 p. (1999)
Security in Open Systems. NIST Special Publication 800-7, US Department of Commerce, 300 p. (1994)
Udemy – Complete Course on Face Detection in Java
Oracle Java – The Complete Reference, 5th edn
http://webcam-capture.sarxos.pl/ - WebCam Capture API
https://github.com/sarxos/webcam-capture - WebCam Capture API
https://software.intel.com/en-us/articles/sound-detector - Sound Sensing Using Javax Sound
https://opencv.org/ - OpenCV Library
Howard, J.D.: An Analysis of Security Incidents on the Internet 1989 to 1995. Carnegie Mellon University, 246 p. (1997)
Department of Defense Trusted Computer System Evaluation Criteria (“Orange Book”). US Department of Defense standard, DoD 5200.28-std., 116 p. (1985). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001
Trusted Network Interpretation of the TCSEC (ìRed Bookî). National Computer Security Center, NCSC-TG-005, 332 p. (1987). http://www.radium.ncsc.mil/tpep/library/rainbow/index.html. Accessed 09 Mar 2001
Gollmann, D.: Computer Security. Wiley, 320 p. (1999)
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, 758 p. (1996)
Stallings, W.: Cryptography and Network Security, Principles and Practise, 2nd edn. Prentice Hall, Inc., 569 p. (1999)
Krause, M., Tipton, H.: Handbook of Information Security Management, 4th edn. Auerbach Publications, 728 p. (1999)
Integrity in Automated Information Systems. National Computer Security Center Report 79-91 (1991)
Information Technology - Open System Interconnection - The Directory: Authentication Framework. Recommendation X.509. ISO/IEC 9594-8, 34 p. (1993)
Dierks, T., Allen, C.: The TLS Protocol, Version 1.0. RFC 2246. IETF (1999). http://www.ietf.org/rfc/rfc2246.txt. Accessed 23 Mar 2001
SSL Protocol Version 3.0. http://home.netscape.com/eng/ssl3/ssl-toc.html. Accessed 02 Jan 2001
Lindholm, T., Yellin F.: The Java Virtual Machine Specification, 2nd edn. Addison Wesley, Inc., 473 p. (1999)
The Java Platform, A White Paper, Douglas Kramer, May 1996. Sun Microsystems. http://java.sun.com/docs/white/index.html. Accessed 09 Mar 2001
Venners, B.: Inside the Java 2 Virtual Machine. McGraw-Hill, Inc., 703 p. (1999)
Chen, E.: Poison Java. IEEE Spectrum, pp. 38–43, August 1999
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khanna, R., Sharma, S. (2019). iDJ: Intrusion Detection System in Java. In: Prateek, M., Sharma, D., Tiwari, R., Sharma, R., Kumar, K., Kumar, N. (eds) Next Generation Computing Technologies on Computational Intelligence. NGCT 2018. Communications in Computer and Information Science, vol 922. Springer, Singapore. https://doi.org/10.1007/978-981-15-1718-1_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-1718-1_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1717-4
Online ISBN: 978-981-15-1718-1
eBook Packages: Computer ScienceComputer Science (R0)